The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Touch Theme: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Touch Theme, in order to execute JavaScript code in the context of the web site...
BIND: denial of service via EDNS Printing
An attacker can send a DNS packet with a malicious EDNS extension to BIND, in order to trigger a denial of service...
Cisco IOS XR, ASR 9000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco IOS XR on ASR 9000, in order to trigger a denial of service...
Puppet: multiple vulnerabilities
An attacker can use several vulnerabilities of Puppet...
Joomla K2 Content: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla K2 Content, in order to execute JavaScript code in the context of the web site...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
WordPress SCv1: directory traversal
An attacker can traverse directories of WordPress SCv1, in order to read a file outside the service root path...
Cisco NX-OS: denial of service via HSRP Authentication
An attacker can send HSRP packets to Cisco NX-OS, in order to trigger a denial of service...
WordPress JW Player: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress JW Player, in order to force the victim to perform operations...
Linux kernel: privilege escalation via inode_capable
A local attacker can manipulate files on Linux, in order to escalate his privileges...
Linux kernel: information disclosure via rd_mcp
A local attacker can read a memory fragment of rd_mcp of the Linux kernel, in order to obtain sensitive information...
dbus: denial of service via AccessDenied
A local attacker can send a malicious message to a dbus service, in order to trigger a denial of service...
Windows, Office, Lync: multiple vulnerabilities of Graphic
An attacker can use several vulnerabilities of Graphic of Windows, Office and Lync...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Word: memory corruption via Embedded Font
An attacker can generate a memory corruption with an embedded font of Word, in order to trigger a denial of service, and possibly to execute code...
Windows: external XML entity injection via XML Core Services
An attacker can transmit malicious XML data via XML Core Services to Windows, in order to read a file, scan sites, or trigger a denial of service...
Microsoft Lync: Cross Site Scripting of Join Meeting
An attacker can trigger a Cross Site Scripting in the Join Meeting feature of Microsoft Lync, in order to execute JavaScript code in the context of the web site...
Windows: denial of service via TCP
An attacker can send TCP packets to Windows, in order to trigger a denial of service...
Windows: altering a RDP session
An attacker can read or alter data of a RDP session of Windows, in order to obtain information, or to disturb the session...
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
NSPR: buffer overflow of sprintf
An attacker can generate a buffer overflow of NSPR via sprintf(), in order to trigger a denial of service, and possibly to execute code...
SAP Business Warehouse: information disclosure via RSDU_CCMS_GET_PROFILE_PARAM
An attacker can use RSDU_CCMS_GET_PROFILE_PARAM of SAP Business Warehouse, in order to obtain sensitive information...
SAP BusinessObjects: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SAP BusinessObjects, in order to execute JavaScript code in the context of the web site...
SAP BusinessObjects: information disclosure via CORBA InfoStore
An attacker can use CORBA InfoStore of SAP BusinessObjects, in order to obtain sensitive information...
SAP BusinessObjects: denial of service via CORBA OSCAFactory-Session
An attacker can use CORBA OSCAFactory::Session of SAP BusinessObjects, in order to trigger a denial of service...
SAP BusinessObjects: information disclosure
An attacker can use SAP BusinessObjects, in order to obtain sensitive information...
SAP HANA: code execution via net.xsjs
An attacker can use net.xsjs of SAP HANA, in order to execute code...
SAP HANA: SQL injection
An attacker can use a SQL injection of SAP HANA, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 443 444 445 446 447 448 449 450 451 453 455 456 457 458 459 460 461 462 463 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114